Details

Category: Social Engineering

Publisher: trickest

Created Date: 6/23/2021

Container: quay.io/trickest/h8mail:v2.5.6

Source URL: https://github.com/khast3x/h8mail

Parameters

keys
string
Command: -k - Pass config options. Supported format: K=V,K=V
chase
string
Command: -ch - Add related emails from hunter.io to ongoing target list. Define number of emails per target to chase. Requires hunter.io private API key if used without power-chase
debug
boolean
Command: --debug - Print request debug information
gzip-src
file
Command: -gz - Local tar.gz (gzip) compressed breaches to scans for targets
url-input
string
Command: -u - String URL input. (Require http:// or https://)
breachcomp
folder
Command: -bc - Path to the breachcompilation torrent folder. Uses the query.sh script included in the torrent
user-query
string
Command: -q - Perform a custom query. Supports username, password, ip, hash, domain. Performs an implicit loose search when searching locally
config-file
file
required
Command: -c - Configuration file for API keys. Accepts keys from Snusbase, WeLeakInfo, Leak-Lookup, HaveIBeenPwned, Emailrep, Dehashed, and hunter
power-chase
boolean
Command: --power-chase - Add related emails from ALL API services to ongoing target list. Use with chase
single-file
boolean
Command: -sf - If breach contains big cleartext or tar.gz files, set this flag to view the progress bar. Disables concurrent file searching for stability
local-breach
file
Command: -lb - Local cleartext breaches to scan for targets.
Command: --loose - Allow loose search by disabling email pattern recognition.
target-input
string
required
Command: -t - String target input
skip-defaults
boolean
Command: -sk - Skips HaveIBeenPwned and HunterIO check
hide-passwords
boolean
Command: --hide - Only shows the first 4 characters of found passwords to output.
url-file-input
file
Command: -u - File URL input
target-file-input
file
required
Command: -t - File target input